Skip to main content
All CollectionsDocumentation and Evidence Collection8 | Vulnerability Management
How to set up vulnerability scanning in your cloud environment
How to set up vulnerability scanning in your cloud environment
Fabiola Munguia avatar
Written by Fabiola Munguia
Updated over 10 months ago

Software vulnerabilities are weaknesses that can either cause an accidental system failure or be intentionally exploited. To prevent this from happening, there are security measures such as Container Scanning that can help to identify vulnerabilities.

In this blog, we will provide instructions on how to set up vulnerability scanners for:


GCP Container Registry (GCR) Container Scanning

Google Container Scanning (Google Cloud Provider, Google Container Registry) provides automated and manual vulnerability scanning to fetch vulnerabilities from containers.

๐Ÿ’Ž Pro Tip: If youโ€™re already doing container vulnerability scanning in GCP, you donโ€™t need to take any action

If not, Secfix recommends you start container scanning, but do decide whether you want to do so yourself. You can learn more about container scanning here. When youโ€™re ready, follow the instructions below to enable each GCP project:

  1. Enable the Container Analysis API: This free API allows you to fetch your repositories.

  2. Activate the Container Scanning API: Start scanning each container for vulnerabilities. This may incur additional charges from GCP.

๐Ÿ•’ Once enabled, you can expect the vulnerabilities to be listed within an hour.


Azure Defender for Container Registries - Container Scanning

Microsoft Defender for Container Registries fetches vulnerabilities from containers. Azure Defender for Container Registries is a feature that automatically scans containers uploaded to Azure Container Registry for vulnerabilities.

๐Ÿ’Ž Pro Tip: If you already use Azure Defender for Container Registries, you donโ€™t need to take any action

However, if youโ€™d like to start using container scanning, follow these instructions:

  1. Go to Pricing and Settings in the Azure Security Center.

  2. Select the subscription you'd like to enable scanning on.

  3. Under Container registries, toggle the switch to On, then scroll up and click Save.

๐Ÿ•’ Once enabled, you can expect the vulnerabilities to be listed within an hour.


Amazon Inspector ECR Scanning

Amazon Inspector fetches vulnerabilities from your servers and provides a report.

To activate Amazon Inspector in your AWS account, opt for one of the two choices:

๐Ÿ•’ Once enabled, you can expect the vulnerabilities to be listed within an hour.


AWS Elastic Container Registry (ECR) Container Scanning

Elastic Container Registry Scanning is fetching vulnerabilities from your containers.
To activate it, opt for one of the two choices:

๐Ÿ•’ Once enabled, you can expect the vulnerabilities to be listed within an hour.


Third-Party Tools for Container Scanning

You can also use tools like Snyk to scan your entire infrastructure.


โ€‹

Did this answer your question?